exploit-db-mirror/platforms/windows/remote/34686.txt
Offensive Security fa2af94205 Updated 09_19_2014
2014-09-19 04:44:37 +00:00

9 lines
No EOL
492 B
Text
Executable file

source: http://www.securityfocus.com/bid/43358/info
Pinky is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue will allow an attacker to read files outside the webroot directory. Information harvested may aid in launching further attacks.
Pinky 1.0 is vulnerable; other versions may also be affected.
http://www.example.com/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../windows/win.ini